×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [9]
北京大学 [4]
西安交通大学 [4]
北京航空航天大学 [2]
数学与系统科学研究院 [2]
兰州理工大学 [1]
更多...
内容类型
期刊论文 [28]
会议论文 [2]
会议 [1]
学位论文 [1]
发表日期
2022 [1]
2020 [1]
2019 [3]
2018 [3]
2017 [2]
2016 [3]
更多...
学科主题
Biochemist... [1]
Materials ... [1]
Plant Scie... [1]
plant scie... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共32条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Arabidopsis F-BOX STRESS INDUCED 4 is required to repress excessive divisions in stomatal development
期刊论文
JOURNAL OF INTEGRATIVE PLANT BIOLOGY, 2022, 卷号: 64, 期号: 1, 页码: 56-72
作者:
Li, Yi
;
Xue, Shan
;
He, Qixiumei
;
Wang, Junxue
;
Zhu, Lingling
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/03/07
cell division
cell cycle
F-BOX
stomatal development
ubiquitination
Faster interpolation algorithms for sparse multivariate polynomials given by straight-line programs
期刊论文
JOURNAL OF SYMBOLIC COMPUTATION, 2020, 卷号: 101, 页码: 367-386
作者:
Huang, Qiao-Long
;
Gao, Xiao-Shan
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/09/23
Black box
Interpolation
Kronecker substitution
Involutory differentially 4-uniform permutations from known constructions
期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 卷号: 87, 期号: 1, 页码: 31-56
作者:
Fu, Shihui
;
Feng, Xiutao
收藏
  |  
浏览/下载:46/0
  |  
提交时间:2019/03/05
Involution
Differentially 4-uniform permutation
Nonlinearity
Permutation
Algebraic degree
06E30
14G50
94A60
AES based on Key dependently nonlinear redundant S-Box
会议论文
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019-01-01
作者:
Seghier, Athmane
;
Li, Jianxin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
AES
Boolean functions
substitution box
linear Redundancy
key-dependent S-Box
Irreducible polynomials
Advanced encryption standard based on key dependent S-Box cube
期刊论文
IET INFORMATION SECURITY, 2019, 卷号: 13, 页码: 552-558
作者:
Seghier, Athmane
;
Li, Jianxin
;
Sun, Da Zhi
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
cryptography
polynomials
active S-Box
original AES
advanced encryption standard
key dependent S-Box cube
encryption algorithm
cryptanalysis attacks
static parameters
substitution box
sensitive parameters
encryption key
interchangeable S-Boxes
statistical properties
cryptographic randomness properties
random rotations
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 卷号: 48, 期号: 12, 页码: 3349-3358
作者:
Zhang, Tong
;
Chen, C. L. Philip
;
Chen, Long
;
Xu, Xiangmin
;
Hu, Bin
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2019/01/08
Boolean function
I-Ching
I-Ching operators 23 (ICOs)
periodic iterated function (PIF)
substitution box (S-Box)
Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes
期刊论文
CHINESE PHYSICS B, 2018, 卷号: 27
作者:
Zhang, Xuan-Ping
;
Guo, Rui
;
Chen, Heng-Wei
;
Zhao, Zhong-Meng
;
Wang, Jia-Yin
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/26
S-box
synchronous substitution and diffusion
image encryption
crack
The limiting layer of fish scales: Structure and properties
期刊论文
ACTA BIOMATERIALIA, 2018, 卷号: 67, 页码: 319-330
作者:
Arola, D.[1]
;
Murcia, S.[2]
;
Stossel, M.[3]
;
Pahuja, R.[4]
;
Linley, T.[5]
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/24
Apatite
Armor
Collagen
Fish scales
Hardness
Ionic substitution
Limiting layer
Nature
Scale morphology
Electron Hole Symmetry Breaking in Charge Transport in Nitrogen-Doped Graphene
期刊论文
ACS NANO, 2017
Li, Jiayu
;
Lin, Li
;
Rui, Dingran
;
Li, Qucheng
;
Zhang, Jincan
;
Kang, Ning
;
Zhang, Yanfeng
;
Peng, Hailin
;
Liu, Zhongfan
;
Xu, H. Q.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
graphene
charge transport
intervalley scattering graphitic nitrogen doping
atomically sharp scattering center
CHEMICAL-VAPOR-DEPOSITION
MONOLAYER GRAPHENE
WEAK-LOCALIZATION
CARRIER TRANSPORT
DOPANTS
GROWTH
FILMS
SCATTERING
SHEETS
Dual-Voltage Single-Rail Dynamic DPA-Resistant Logic Based on Charge Sharing Mechanism
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2017
Tang Wenyi
;
Jia Song
;
Wang Yuan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
DPA
Charge sharing
Three-phase logic family
Side-channel attacks
©版权所有 ©2017 CSpace - Powered by
CSpace